Ricoh Aficio SP 3510DN Software Guide - Page 90

None], [DES], [AES-128], [AES-256], Settings] and [IKE Settings].

Page 90 highlights

5. Monitoring and Configuring the Printer Item Action Description Specify how the IP packets are processed from the following: • [Allow]: IP packets are both sent and received without IPsec applied to them. • [Drop]: IP packets are discarded. • [Require Security]: IPsec is applied to IP packets that are both sent and received. If you have selected [Require Security], you must configure [IPsec Settings] and [IKE Settings]. IPsec Settings Item Encapsulation Type Security Protocol Authentication Algorithm for AH Encryption Algorithm for ESP Description Specify the encapsulation type from the following: • [Transport]: Select this mode to secure only the payload section of each IP packet when communicating with IPsec compliant devices. • [Tunnel]: Select this mode to secure every section of each IP packet. We recommend this type for communication between security gateways (such as VPN devices). Select the security protocol from the following: • [AH]: Establishes secure communication that supports authentication only. • [ESP]: Establishes secure communication that supports both authentication and data encryption. • [ESP&AH]: Establishes secure communication that supports both data encryption and authentication of packets, including packet headers. Note that you cannot specify this protocol when [Tunnel] is selected for [Encapsulation Type]. Specify the authentication algorithm to be applied when [AH] or [ESP&AH] is selected for [Security Protocol] from the following: [MD5], [SHA1] Specify the encryption algorithm to be applied when [ESP] or [ESP&AH] is selected for [Security Protocol] from the following: [None], [DES], [3DES], [AES-128], [AES-192], [AES-256] 88

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140

Item
Description
Action
Specify how the IP packets are processed from the following:
[Allow]: IP packets are both sent and received without IPsec applied to
them.
[Drop]: IP packets are discarded.
[Require Security]: IPsec is applied to IP packets that are both sent and
received.
If you have selected [Require Security], you must configure [IPsec
Settings] and [IKE Settings].
IPsec Settings
Item
Description
Encapsulation Type
Specify the encapsulation type from the following:
[Transport]: Select this mode to secure only the payload section of
each IP packet when communicating with IPsec compliant devices.
[Tunnel]: Select this mode to secure every section of each IP packet.
We recommend this type for communication between security
gateways (such as VPN devices).
Security Protocol
Select the security protocol from the following:
[AH]: Establishes secure communication that supports authentication
only.
[ESP]: Establishes secure communication that supports both
authentication and data encryption.
[ESP&AH]: Establishes secure communication that supports both data
encryption and authentication of packets, including packet headers.
Note that you cannot specify this protocol when [Tunnel] is selected
for [Encapsulation Type].
Authentication
Algorithm for AH
Specify the authentication algorithm to be applied when [AH] or [ESP&AH]
is selected for [Security Protocol] from the following:
[MD5], [SHA1]
Encryption Algorithm
for ESP
Specify the encryption algorithm to be applied when [ESP] or [ESP&AH] is
selected for [Security Protocol] from the following:
[None], [DES], [3DES], [AES-128], [AES-192], [AES-256]
5. Monitoring and Configuring the Printer
88